Problem 2 ! For this problem, solve by hand or write a program (perhaps in Python). If you write a program, please submit the code as a second submission file, as described above. This problem involves cryptanalyzing a Vigenère cipher, which you may read about on Wikipedia: https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher. Vigenère ciphers can generally be de- ciphered using Kasiski examination, which is discussed on the Wikipedia page. You can find some ciphertext produced with the Vigenère cipher under a certain key on our course website at: https://cseweb.ucsd.edu/classes/fa21/cse107-a/resources/hw1/ciphertext. We have also provided sample decryption code at: https://cseweb.ucsd.edu/classes/fa21/cse107-a/resources/hw1/decrypt.py. Encrypting a plaintext letter with a key letter A results in no change, encrypting with a key letter B results in an increment by one place in the alphabet, encrypting with a key letter C results in an increment by two places, and so on. Assume that the original plaintext contains only uppercase letters (A-Z) and no spaces or punctuation. For example, encrypting the plaintext ATTACKATDAWN with the key BLAISE results in the following

EBK JAVA PROGRAMMING
9th Edition
ISBN:9781337671385
Author:FARRELL
Publisher:FARRELL
Chapter13: File Input And Output
Section: Chapter Questions
Problem 6PE
icon
Related questions
Question
For this problem, solve by hand or write a program (perhaps in Python).
If you write a program, please submit the code as a second submission file, as described above.
Problem 2 !
This problem involves cryptanalyzing a Vigenère cipher, which you may read about on Wikipedia:
https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher. Vigenère ciphers can generally be de-
ciphered using Kasiski examination, which is discussed on the Wikipedia page.
You can find some ciphertext produced with the Vigenère cipher under a certain key on our course
website at: https://cseweb.ucsd.edu/classes/fa21/cse107-a/resources/hw1/ciphertext.
We have also provided sample decryption code at:
https://cseweb.ucsd.edu/classes/fa21/cse107-a/resources/hw1/decrypt.py.
Encrypting a plaintext letter with a key letter A results in no change, encrypting with a key letter
B results in an increment by one place in the alphabet, encrypting with a key letter C results in an
increment by two places, and so on. Assume that the original plaintext contains only uppercase
letters (A-Z) and no spaces or punctuation.
For example, encrypting the plaintext ATTACKATDAWN with the key BLAISE results in the following
ciphertext:
Plaintext
АТТАСКАTDAWN
Key
Ciphertext BETIUOBEDIOR
BLAISEBLAISE
The goal for this part of the homework is to figure out what key was used to encrypt your ciphertext.
(a)
What is the key?
(E,
free to reference sections of your submitted code, but please write your explanation in clear
English sentences.
How did you recover the key? Explain your methodology at a high level. Feel
Transcribed Image Text:For this problem, solve by hand or write a program (perhaps in Python). If you write a program, please submit the code as a second submission file, as described above. Problem 2 ! This problem involves cryptanalyzing a Vigenère cipher, which you may read about on Wikipedia: https://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher. Vigenère ciphers can generally be de- ciphered using Kasiski examination, which is discussed on the Wikipedia page. You can find some ciphertext produced with the Vigenère cipher under a certain key on our course website at: https://cseweb.ucsd.edu/classes/fa21/cse107-a/resources/hw1/ciphertext. We have also provided sample decryption code at: https://cseweb.ucsd.edu/classes/fa21/cse107-a/resources/hw1/decrypt.py. Encrypting a plaintext letter with a key letter A results in no change, encrypting with a key letter B results in an increment by one place in the alphabet, encrypting with a key letter C results in an increment by two places, and so on. Assume that the original plaintext contains only uppercase letters (A-Z) and no spaces or punctuation. For example, encrypting the plaintext ATTACKATDAWN with the key BLAISE results in the following ciphertext: Plaintext АТТАСКАTDAWN Key Ciphertext BETIUOBEDIOR BLAISEBLAISE The goal for this part of the homework is to figure out what key was used to encrypt your ciphertext. (a) What is the key? (E, free to reference sections of your submitted code, but please write your explanation in clear English sentences. How did you recover the key? Explain your methodology at a high level. Feel
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps with 1 images

Blurred answer
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
EBK JAVA PROGRAMMING
EBK JAVA PROGRAMMING
Computer Science
ISBN:
9781337671385
Author:
FARRELL
Publisher:
CENGAGE LEARNING - CONSIGNMENT
Programming Logic & Design Comprehensive
Programming Logic & Design Comprehensive
Computer Science
ISBN:
9781337669405
Author:
FARRELL
Publisher:
Cengage